BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archive and runs bentoml containerize, attacker-controlled Jinja2 template code executes arbitrary Python directly on the host machine, bypassing all container isolation. This vulnerability is fixed in 1.4.38.
References
| Link | Resource |
|---|---|
| https://github.com/bentoml/BentoML/security/advisories/GHSA-v959-cwq9-7hr6 | Exploit Vendor Advisory |
Configurations
History
10 Apr 2026, 18:31
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:* | |
| First Time |
Bentoml
Bentoml bentoml |
|
| References | () https://github.com/bentoml/BentoML/security/advisories/GHSA-v959-cwq9-7hr6 - Exploit, Vendor Advisory |
06 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 18:16
Updated : 2026-04-10 18:31
NVD link : CVE-2026-35044
Mitre link : CVE-2026-35044
CVE.ORG link : CVE-2026-35044
JSON object : View
Products Affected
bentoml
- bentoml
CWE
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
